咨询与建议

限定检索结果

文献类型

  • 1,015 篇 会议
  • 738 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,108 篇 工学
    • 879 篇 计算机科学与技术...
    • 737 篇 软件工程
    • 264 篇 信息与通信工程
    • 192 篇 生物工程
    • 148 篇 控制科学与工程
    • 106 篇 电气工程
    • 88 篇 电子科学与技术(可...
    • 83 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 化学工程与技术
    • 48 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 29 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 材料科学与工程(可...
  • 594 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 101 篇 物理学
    • 71 篇 化学
    • 55 篇 系统科学
  • 340 篇 管理学
    • 195 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 60 篇 医学
    • 52 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 17 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 72 篇 training
  • 69 篇 semantics
  • 65 篇 feature extracti...
  • 64 篇 deep learning
  • 39 篇 predictive model...
  • 36 篇 neural networks
  • 34 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 graph neural net...
  • 28 篇 reinforcement le...
  • 28 篇 optimization
  • 27 篇 conferences
  • 27 篇 federated learni...
  • 26 篇 cloud computing
  • 25 篇 contrastive lear...
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 112 篇 college of compu...
  • 109 篇 national enginee...
  • 68 篇 shenzhen researc...
  • 57 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 35 篇 college of compu...
  • 32 篇 college of big d...
  • 31 篇 key laboratory o...
  • 31 篇 peng cheng labor...
  • 29 篇 chongqing univer...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 24 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 53 篇 shi qingjiang
  • 38 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 20 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 li liu
  • 18 篇 yan meng
  • 17 篇 hu chunqiang
  • 16 篇 hongyu zhang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,565 篇 英文
  • 173 篇 其他
  • 18 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1754 条 记 录,以下是521-530 订阅
排序:
A Lightweight Blockchain-Based Cooperative Demand Response and Energy Trading Model for Smart Grid
A Lightweight Blockchain-Based Cooperative Demand Response a...
收藏 引用
2023 Power Electronics and Power System Conference, PEPSC 2023
作者: Ayenew, Melak Lei, Hang Li, Xiaoyu Kekeba, Kulla Abeje, Eyerusalem Tegene, Abebe Alemu, Habtamu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Addis Ababa Science and Technology University Center of Big Data Analytics and Hpc Addis Ababa Ethiopia Kotebe Education University Collage of Natural Department of Mathematic Science Shared Campus Addis Ababa Ethiopia
Public blockchain networks have been used for peer-to-peer energy trading;however, most of these networks are inefficient. The power-intensive consensus algorithm, Proof-of-Work (PoW), is one of the reasons for power ... 详细信息
来源: 评论
Implicit and Explicit Language Guidance for Diffusion-based Visual Perception
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Hefeng Cao, Jiale Xie, Jin Yang, Aiping Pang, Yanwei The School of Electrical and Information Engineering Tianjin University Tianjin300072 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China The School of Big Data and Software Engineering Chongqing University Chongqing401331 China
Text-to-image diffusion models have shown powerful ability on conditional image synthesis. With large-scale vision-language pre-training, diffusion models are able to generate high-quality images with rich texture and... 详细信息
来源: 评论
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Wenlian Huang Guanming Zhu Qiang Huang Zhuangzhuang Chen Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o...
来源: 评论
DeepGATGO: A Hierarchical Pretraining-Based Graph-Attention Model for Automatic Protein Function Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zihao Jiang, Changkun Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Lab for Big Data System Computing Technology Shenzhen University Shenzhen China
Automatic protein function prediction (AFP) is classified as a large-scale multi-label classification problem aimed at automating protein enrichment analysis to eliminate the current reliance on labor-intensive wet-la... 详细信息
来源: 评论
Cross Space and Time: A Spatio-Temporal Unitized Model for Traffic Flow Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Ruan, Weilin Wang, Wenzhuo Zhong, Siru Chen, Wei Liu, Li Liang, Yuxuan The Hong Kong University of Science and Technology Guangzhou China The Computer Science Department Jinan University Guangzhou China The School of Big Data and Software Engineering Chongqing University Chongqing China
Predicting spatio-temporal traffic flow presents significant challenges due to complex interactions between spatial and temporal factors. Existing approaches often address these dimensions in isolation, neglecting the... 详细信息
来源: 评论
2D Animation - Q Version of the AIDS Prevention Short Video  10
2D Animation - Q Version of the AIDS Prevention Short Video
收藏 引用
10th International Conference on Orange Technology, ICOT 2022
作者: Wei, Chun-Cheng Hsieh, Hui-Ming Hung, Long-Chen Chen, Ru-Yi Huang, Jiang-Fang Lu, Xin-Chun Zhong, Yu-Shan School of Software and Big Data Changzhou College of Information Technology Changzhou China Taiwan Shoufu University Department of Computer Science and Multimedia Design Tainan Taiwan Lunghwa University of Science and Technology Department of Electronic Engineering Taiwan
AIDS is a sexually transmitted disease. The medical term is called Acquired Immune Deficiency Syndrome. Medical methods such as cocktail therapy and anticancer drugs can kill AIDS. Although there are currently cured c... 详细信息
来源: 评论
Identifying Key Tag Distribution in Large-Scale RFID Systems
Identifying Key Tag Distribution in Large-Scale RFID Systems
收藏 引用
International Workshop on Quality of Service
作者: Yanyan Wang Jia Liu Shen-Huan Lyu Zhihao Qu Bin Tang Baoliu Ye Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University China College of Computer Science and Software Engineering Hohai University China State Key Laboratory for Novel Software Technology Nanjing University China
With the proliferation of RFID-enabled applications, multiple readers are required for the complete coverage of numerous tags in a large-scale RFID system. In this scenario, we sometimes pay more attention to a subset... 详细信息
来源: 评论
Energy-Efficient Client Sampling for Federated Learning in Heterogeneous Mobile Edge Computing Networks
Energy-Efficient Client Sampling for Federated Learning in H...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Jian Tang Xiuhua Li Hui Li Min Xiong Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China TKLAN College of Intelligence & Computing Tianjin University Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Electrical & Computer Engineering The University of British Columbia Vancouver Canada
To address network congestion and data privacy concerns, federated learning (FL) that combines multiple clients and a parameter server has been widely used in mobile edge computing (MEC) networks to process the abunda... 详细信息
来源: 评论
Efficient Routing Protection Algorithm in Large-Scale Networks
收藏 引用
Computers, Materials & Continua 2021年 第2期66卷 1733-1744页
作者: Haijun Geng Han Zhang Yangyang Zhang School of Software Engineering Shanxi UniversityTaiyuan030006China Institute of Big Data Science and Industry Shanxi UniversityTaiyuan030006China School of Cyber Space and Technology Beihang UniversityBeijing100191China College of Engineering Northeastern University Boston02115USA
With an increasing urgent demand for fast recovery routing mechanisms in large-scale networks,minimizing network disruption caused by network failure has become ***,a large number of relevant studies have shown that n... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger Technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论